Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses. MD5 is one technique that is widely used in password data security issues, which algorithm has many advantages including. MD5 has a one-way hash function so that the message has been converted to a message digest, and it is complicated to restore it to the original message (plaintext). In addition to the advantages of MD5 also has a variety of shortcomings including; very easy to solve because MD5 has a fixed encryption result, using the MD5 modifier generator will be easily guessed, and MD5 is not proper because it is vulnerable to collision attacks. The research method used in this study uses Computer Science Engineering by conducting experiments combining two cryptographic arrangements. The results obtained from this study after being tested with Avalanche Effect technique get ciphertext randomness results of 43.69%, which tends to be very strong to be implemented in password data authentication.
Inayatullah, “Analisis Penerapan Algoritma MD5 Untuk Pengamanan Password,” J. Algoritm., vol. 3, no. 3, pp. 1–5, 2017.
D. Kurniawan and B. Priyatna, “Pengamanan Data Berbasis Mobile Android Dengan Penggabungan Linear Feedback Shift Register (LFSR) Dan Modifikasi Matriks Kunci Algoritma Kriptografi Playfair Cipher,” J. Telemat. MKOM Vol, vol. 10, no. 1, 2018.
B. Priyatna and A. L. Hananto, “ZFONE SECURITY ANALYSIS OF VIDEO CALL SERVICE USING GENERAL NEWORK DESIGN PROCESS METHOD ( GNDP ).”
A. L. Hananto, A. Solehudin, A. S. Y. Irawan, and B. Priyatna, “Analyzing the Kasiski Method Against Vigenere Cipher,” arXiv Prepr. arXiv1912.04519, 2019.
N. Hayati, M. A. Budiman, and A. Sharif, “Implementasi Algoritma RC4A dan MD5 untuk menjamin Confidentiality dan integrity pada file teks,” SinkrOn, vol. 1, no. 2, 2017.
D. Sharma, P. Sarao, and S. Dudi, “Implementation of Md5-640 Bits Algorithm,” Int. J. Adv. Res. Comput. Sci. Manag. Stud., vol. 3, no. 5, pp. 286– 293, 2015.
A. Qashlim and Rusdianto, “Implementasi Algoritma Md5 Untuk Keamanan Dokumen,” J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 10–16, 2016.
T. F. Prasetyo and A. Hikmawan, “Analisis Perbandingan Dan Implementasi Sistem Keamanan Data Menggunakan Metode Enkripsi RC4 SHA Dan MD5,” INFOTECH J., vol. 2, no. 1, 2016.
M.-J. Wang and Y.-Z. Li, “Hash function with variable output length,” 2015 Int. Conf. Netw. Inf. Syst. Comput., pp. 190–193, 2015.
Z. Musliyana, T. Y. Arif, and R. Munadi, “Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia,” J. Rekayasa Elektr., vol. 12, no. 1, p. 21, 2016.
I. Hmac-sha and H.-P. Ipsec, “Implementasi HmacSha1,Tripledes-Cbc,Hmac-MD5-96 Pada IPsec,” no. May, 2016.  D. Kurniawan, A. L. Hananto, and B. Priyatna, “Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android,” Int. J. Comput. Tech. -–, vol. 5, no. 1, pp. 65–70, 2018.
A. L. Hananto and A. R. Priyatna, Bayu, “Android Data Security Using Cryptographic Algorithm Combinations,” Int. J. Psychosoc. Rehabil., vol. Volume 24, no. Issue 7, pp. 3307–3318, 2020.
R. M. Marzan and A. M. Sison, “An Enhanced Key Security of Playfair Cipher Algorithm,” in Proceedings of the 2019 8th International Conference on Software and Computer Applications, 2019, pp. 457–461.
E. H. Nurkifli, “Modifikasi Algoritma Playfair Dan Menggabungkan Dengan Linear Feedback Shift Register ( Lfsr ),” vol. 2014, no. Sentika, 2014.